Need for Key Management in Cloud and Comparison of Various Encryption Algorithm
Keywords:
Network Security, Security Threats, Encryption AlgorithmsAbstract
If the design of the world wide web is moderated, it can minimize the possible attacks that could be sent out all over the network. Knowing the assault techniques allows our company to arise along with necessary security. Many companies get themselves from the net using firewall softwares and file encryption operations. Your business creates an "intranet" to stay linked to the internet, however, safeguarded from possible hazards. The safety and security risks are increasing day after day and making high speed wired/wireless network and also net services, unsteady and unstable. Currently-- a - days protection solutions works a lot more notably towards satisfying the reducing side requirements these days' expanding markets. The need is likewise generated into the regions like defence, were protected as well as authenticated get access to of resources is the vital issues connected to info protection. This paper gives the importance towards the need for key management in cloud and also compares various encryption algorithms.
References
- I. Kotenko and also A. Chechulin, "Attack choices in and also protection assessment in SIEM units," International Deals on Systems-Scientific Research as well as Functions, vol. 8, pp. 129-- 147, December 2013.
- I. Kotenko, I. Saenko, O. Polubelova, as well as E. Doynikova, "The ontology of metrics for surveillance examination and choice support in SIEM systems," in Proc. of the 8th International Seminar on Schedule, Dependability as well as Protection (ARES'thirteen), Regensburg, Germany. IEEE, September 2013, pp. 638-- 645.
- M. S. Ahmed, E. Al-Shaer, and also L. Khan, "An unfamiliar measurable approach for gauging system safety," in Proc. of The 27th IEEE Seminar on Pc Communications (INFOCOM'08), Phoenix Az, Arizona, UNITED STATES. IEEE, April 2008, pp. 1957-- 1965.
- C. W. Axelrod, "Audit for worth and also anxiety in protection metrics," Information Solution Control Publication, vol. 6, pp. 1-6, 2008.
- B. A. Blakely, "Cyberprints were determining cyber aggressors through attribute analysis," PhD treatise, Iowa State University, 2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.